Abstract
The distribution of cryptographic keys has always been a major problem in applications with many users. Solutions were found for closed user groups and small open systems. These are, however, not efficient for large networks. We propose an identity-based approach to that problem which is simple and applicable to networks of arbitrary size. With the solution proposed, the user group can, furthermore, be extended at will. Each new user needs only to visit a key authentication center (KAC) once and is from then on able to exchange authenticated keys with each other user of the network. We expect this type of approach, which was originally conceived for authentication and signatures, to play an increasing role in the solution of all types of key distribution problems.
Download conference paper PDF
References
W. Diffie, M.E. Hellman, “New Directions in Cryptography,” IEEE Trans. on Inform. Theory, vol. IT-22, pp. 644–654, Nov. 1976.
T. El-Gamal, “A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” IEEE Trans. on Inform. Theory, vol. IT-31, pp. 469–472, July 1985.
R.L. Rivest, A. Shamir, L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Comm. ACM, vol. 21, pp. 120–126, Feb. 1978.
A. Shamir, “Identity-Based Cryptosystems and Signature Schemes,” Advances in Cryptology-CRYPTO’84, Lect. Notes in Computer Science, vol. 196, pp. 47–53, Springer-Verlag (1985).
S. Goldwasser, S. Micali, C. Rackoff, “The Knowledge Complexity of Interactive Proof Systems,” SIAM J. Comput., vol. 18, pp. 186–208, Feb. 1989.
U. Feige, A. Fiat, A. Shamir, “Zero-Knowledge Proofs of Identity,” J. of Cryptology, vol. 1, pp. 77–94, 1988.
A. Fiat, A. Shamir, “How to Prove Yourself: Practical Solutions to Identification and Signature Problems,” Advances in Cryptology-CRYPTO’86, Lect. Notes in Computer Science, vol. 263, pp. 186–194, Springer-Verlag (1987).
T. Beth, “Efficient Zero-Knowledge Identification Scheme for Smart Cards,” Advances in Cryptology-EUROCRYPT’88, Lect. Notes in Computer Science, vol. 330, pp. 77–84, Springer-Verlag (1988).
L.C. Guillou, J.-J. Quisquater, “A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory,” Advances in Cryptology-EUROCRYPT’88, Lect. Notes in Computer Science, vol. 330, pp. 123–128, Springer-Verlag (1988).
D. Chaum, J.-H. Evertse, J. van de Graaf, “An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations,” Advances in Cryptology-EUROCRYPT’87, Lect. Notes in Computer Science, vol. 304, pp. 127–141, Springer-Verlag (1988).
F. Bauspieß, H.-J. Knobloch, “How to Keep Authenticity Alive in a Computer Network,” Advances in Cryptology-EUROCRYPT’89, Lect. Notes in Computer Science, this issue, Springer Verlag.
E. Okamoto, K. Tanaka, “Key Distribution System Based on Identification Information,” IEEE J. Select. Areas Commun., vol. SAC-7, pp. 481–485, May 1989.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1990 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Günther, C.G. (1990). An Identity-Based Key-Exchange Protocol. In: Quisquater, JJ., Vandewalle, J. (eds) Advances in Cryptology — EUROCRYPT ’89. EUROCRYPT 1989. Lecture Notes in Computer Science, vol 434. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46885-4_5
Download citation
DOI: https://doi.org/10.1007/3-540-46885-4_5
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-53433-4
Online ISBN: 978-3-540-46885-1
eBook Packages: Springer Book Archive